Redirigiendo al acceso original de articulo en 21 segundos...
ARTÍCULO
TITULO

Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges

Boubakeur Annane    
Osman Ghazali    

Resumen

The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud?s servers. Currently, the eyes of the security expert?s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.

 Artículos similares

       
 
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammed Adam Taheir and Omprakash Kaiwartya    
The widespread use of technology has made communication technology an indispensable part of daily life. However, the present cloud infrastructure is insufficient to meet the industry?s growing demands, and multi-access edge computing (MEC) has emerged as... ver más
Revista: Computers

 
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula    
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ... ver más
Revista: Information

 
Poh Soon JosephNg, Pin Sen BrandonChan and Koo Yuen Phan    
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intell... ver más

 
Hongli Zhang and Ying Li    
Computation-intensive vehicle tasks sharply increase with the rapid growth of intelligent vehicles. The technology of Mobile Edge Computing (MEC) has the possibility of assisting vehicles with computation offloading. To solve the problem of computation r... ver más
Revista: Information

 
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information